I really enjoy Firefox on Android as I can install a bunch of extensions and I find those extensions game changer, especially on the mobile.

One of my favorites are

  • Libredirect - literally one of my favorite ones. Redirects popular sites to privacy focused frontends, like YouTube to Invidious, etc.
  • uBlock Origin - I guess everyone knows this one
  • Privacy Badger - blocks trackers
  • Ghostery - blocks trackers, ads, scripts, etc.

What extensions do you guys use?

  • @delirious_owl
    link
    328 days ago

    Chameleon. My user agent changes every 30 seconds. Makes attempts to track me basically useless.

    • @EvenOdds@lemm.ee
      link
      fedilink
      428 days ago

      Changing your user agent will not stop you being tracked. Browser fingerprinting can work with heaps of different signals, and is very difficult to block.

      • @delirious_owl
        link
        -2
        edit-2
        28 days ago

        It means I’m being tracked for 30 seconds. So basically useless tracking.

        Chameleon doesn’t just change the user agent. It changes a bunch of stuff that’s used to break fingerprinting. Of course you have a fingerprint, but it constantly changes so that the data they collect is so short lived that its useless to them and therefore very useful to me.

        • @pathief@lemmy.world
          link
          fedilink
          2
          edit-2
          26 days ago

          You can try to fool it with a VPN, change country, etc but it doesn’t work. Fingerprinting is very strong these days.

          • @delirious_owl
            link
            026 days ago

            That website is marketing bullshit. It doesn’t tell you if you fingerprint “ID” is unique. If can just spit out the same fingerprint for millions of users, and it looks impressive but its totally worthless as a fingerprint.

            Try again with some service that isn’t trying to sell you their product

            • Album
              link
              fedilink
              2
              edit-2
              16 days ago

              https://abrahamjuliot.github.io/creepjs/index.html

              Your extension might make you MORE finger-printable. Advanced fingerprinting scripts can detect lies told by extensions.

              https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]#-fingerprinting

              If you’re actually interested in reducing your fingerprint you should read the arkenfox guide which leverages built in features from firefox. You’ll see very quickly that if someone wants to fingerprint you it’s trivial and there’s little you can do short of TOR.

              more reading: https://www.privacyguides.org/en/desktop-browsers/?h=fingerprint#anti-fingerprinting

              • @delirious_owl
                link
                116 days ago

                Again, they can fingerprint me. Buy their fingerprint is useless because it constantly changes.

                • Album
                  link
                  fedilink
                  216 days ago

                  You misunderstand. They’re calculating a fingerprint that identifies you across sessions despite you changing up a bunch of values on your browser with an extension because that’s all highly detectable. They know it’s junk data they don’t use it. It actually is worse because you stop blending in with the crowd.

                  You’re better off blending in then trying to look unique with every visit. The latter is a flawed concept.

                  Read the arkenfox guide they get into it. Most extensions just reduce your ability to blend in to the crowd and thus should be avoided.

                  • @delirious_owl
                    link
                    116 days ago

                    They don’t. I’m telling you they don’t. When I disable my ad blocker, the ads I see are not relevant to me. Many times they’re not even in a language that I can speak.

                    They are not tracking me between sessions. Its obvious.

                    What you’re saying makes sense, and its why Tor does what it does. But in practice, this works too.

    • Treasure
      link
      fedilink
      228 days ago

      Are you passing CloudFlare captchas with that? I’m using a VPN and whenever I hit a CloudFlare captcha with a modified user agent, it doesn’t let me pass.

      • @delirious_owl
        link
        228 days ago

        Sometimes. It depends if the admin misconfigured their cloudflare.

        I dont have issues logging into cloudflare’s website itself with this setup. I have had to email many website admins to let them know that they have a broken cloudflare config.

        • JackbyDev
          link
          fedilink
          English
          127 days ago

          I would imagine many services would think you’re hijacking the session or something.

          • @delirious_owl
            link
            0
            edit-2
            26 days ago

            No, that would he a very dumb system. Because it would false positive every time someone changed their user agent, which is a common defense tactic in today’s threat landscape.

            You don’t want to ban someone for protecting themselves. But I’m sure there are dumb execs who have thought this was a good idea until someone on the sec team slapped them and said “no”